Information Systems/Data Intergrity

Requirements to Reduce Potential Risks

  • Appropriate controls must be established in computer systems to ensure the confidentiality, integrity, and availability of information through authorization, accountability, and authentication of users. The sharing of passwords and user accounts is strictly prohibited.
  • Each department must ensure that all financial and personnel transactions are recorded accurately and in a timely manner. Transactions should reflect accurately the actual value or information involved, and contain sufficient detail to support post authorization review and audit. Transactions should be stored securely, readily retrievable, and safeguarded against improper alteration, disclosure or use.
  • Systems developed by departments must be secure, reliable, responsive, and accessible. These systems must be designed, tested, documented, and maintained according to university policy and UC development and implementation standards. They should be built upon sound data models and employ technology that meets user needs and allows data to be shared appropriately.
  • Systems developed by departments must contain controls to ensure that data is synchronized with and validated against core systems. These systems must also contain appropriate interfaces to any core financial systems.
  • Local and wide area networks (including electronic mail and calendaring) must be reliable, stable, and secure.
  • Appropriate systems backup, recovery and contingency planning must be established in accordance with UC Business & Finance Bulletin IS-3 and guidelines established by the Campus Information Security Guidelines Coordinator, who has initiatives posted on the web at

The validity of the charges and credits appearing on the general ledger and payroll/personnel system should be certified at the end of each accounting period (i.e., monthly). The person approving KFS purchasing and accounts payable documents shall be someone other than the person initiating the documents as required by UC Davis PPM 310-11.

  • Employees must be adequately trained in the use of on-line systems and transactions.

  • Encourage employees to report any compromise or break down in the unit's data integrity without fear of reprisal.

  • A unit’s financial reporting and monitoring process should be integrated with UC Davis PPS data warehouse and Decision Support.

Supplemental content

Download a PDF Copy of this Handbook